How to Spot a Phishing Email

Quick Tip: Type website names directly into your browser for any “phishy” offer delivered by email. That way you do not give away your log in information or download a virus.

Why: A phishing email is a bogus email carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular web site or to click and download a virus.

October 2019 Trivia Challenge

Congratulations to our trivia winner, Pamela Hoff of Murphy Partners LLP, the lucky recipient of an Amazon gift card!

QUESTION:  What popular fall festival activity did the Romans bring to Britain when they invaded?

ANSWER: Bobbing for Apples

The Benefits of Outsourcing IT Projects

What are the benefits of outsourcing IT projects?  You might be surprised to learn that even companies with full-time, in-house IT staff sometimes choose to outsource specific projects.  Perhaps it’s a large-scale undertaking with a short turnaround time that would simply be too taxing for the internal team to complete while performing their day-to-day jobs.

Masquerading to Attack Your Network

Many of us enjoy Halloween and have a lot of fun dressing up and pretending to be someone or something we are not. Who doesn’t love a masquerade party? However, when it comes to your company’s network, a visitor in disguise is not welcome.

Most small and midsize business (SMB) owners focus on the day-to-day operations of their organization, driving growth, facilitating hiring and guiding marketing, without a single thought to the security of the computer networks these processes depend on.

Let’s Get Carving!

Leaves are falling and Halloween is right around the corner. Eager pumpkin carvers are preparing orange masterpieces to decorate their porches, but did you know the jack-o'-lantern once served an entirely different purpose?

The ancient tradition of the jack-o'-lantern was once believed to ward off unwanted spirits, scaring off monsters that might otherwise go bump in the night.

End-of-Life Technology Risks Can Be Substantial

Relying on end-of-life technology carries substantial risks that can put your business model in jeopardy. In order to deliver reliable service to customers and ensure that their sensitive data is safe, you need technology that is up to the task. While waiting until the last minute to replace hardware and/or software may be viewed as a cost savings measure, technology that is unsupported and can’t be fixed in a timely manner should something go wrong could ultimately cost you more than you bargained for.

Cathy’s Corner – October 2019

From the desk of: Cathy Coloff
Subject: You are the #1 Target!

Generally, everyone fears something. Halloween is one of those traditions that pokes fun at, while at the same time plays off of, people’s fears. As I’ve grown older, my childhood fears of things that go bump in the night have disappeared and been replaced by other fears that perhaps I have yet to discover.